Advances in Hardware Design for Security and Trust
Herausgeber: Vemuri, Ranga; Emmert, John
Advances in Hardware Design for Security and Trust
Herausgeber: Vemuri, Ranga; Emmert, John
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods.
Andere Kunden interessierten sich auch für
Hai LiNonvolatile Memory Design329,99 €
Gunneswara Vsss Kalaga RaoDesign of Internet of Things149,99 €
Digital Design and Fabrication185,99 €
Advances in Networks, Intelligence and Computing56,99 €
Advances in Mathematical and Computational Modeling of Engineering Systems177,99 €
Quality Assessment and Security in Industrial Internet of Things109,99 €
Joseph CavanaghVerilog HDL Design Examples79,99 €-
-
-
This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 370
- Erscheinungstermin: 30. September 2025
- Englisch
- Abmessung: 240mm x 161mm x 24mm
- Gewicht: 719g
- ISBN-13: 9781032840420
- ISBN-10: 1032840420
- Artikelnr.: 73333320
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- Seitenzahl: 370
- Erscheinungstermin: 30. September 2025
- Englisch
- Abmessung: 240mm x 161mm x 24mm
- Gewicht: 719g
- ISBN-13: 9781032840420
- ISBN-10: 1032840420
- Artikelnr.: 73333320
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Ranga Vemuri is a Professor in Electrical and Computer Engineering and directs the Digital Design Environments Lab at the University of Cincinnati where served since 1989. His interests are in Hardware Trust, Correctness and Security, VLSI Design and Design Automation, and Reconfigurable Computing. His research has been funded by AFRL, DAGSI, DARPA, NSF, State of Ohio and various industries. He and his students have published over 300 papers and have received several Best Paper Awards and nominations. Prof. Vemuri co-authored two books and graduated 42 PhD and over 90 MS students. He served on the program committees of numerous international conferences and served as an Associate Editor of the IEEE Transactions on VLSI and as a Guest Editor of the IEEE Computer. John Emmert has been an Electrical Engineering Professor since 1999. His research has been funded by AFRL, DARPA, NSF, the US Congress, the State of Ohio and various industrial companies, and he currently has eight full and three provisional US patents, all related to integrated circuit design. He is the Director of the NSF Center for Hardware and Embedded Systems Security and Trust (CHEST) I/UCRC. He also served in the United States Air Force from 1989-2015. In the Air Force he held positions from UAV pilot to reserve wing commander, and after 26 years of service, he retired as a Colonel. He has been awarded the Air Force Legion of Merit and five Meritorious Service Medals.
1. Introduction 2. Hardware Security In The Consumer Technology Industry 3.
A Commercial EDA Perspective on Hardware Security, Safety, and Trust 4.
Machine Learning Techniques for Detecting Hardware Trojans in ASIC designs
5. Next-Generation Semiconductor Reverse Engineering: Laser Delayering,
Correlative Imaging, and Cloud-Enabled Image Analysis Techniques 6.
Synthesis of Polymorphic Circuits for Hardware Security 7. Design
Obfuscation and Performance Locking Solutions for Mixed-Signal, Analog and
RF ICs 8. On-Chip Integrity, Reliability, and Aging Assurance Techniques
for ICs 9. Deep Learning Side-Channel Attack: Challenges and Opportunities
10. Side Channel Attack Avoidance and Mitigation through Asynchronous
Digital Design 11. Is ARM TrustZone trustable for confidentiality
protection? 12. Security Verification for Next Generation SoCs 13. Cloud
FPGA Accelerator Fingerprinting Using Communication Side-Channels 14.
Enterprise Risk Management of Electronics and Computing Device Supply
Chains
A Commercial EDA Perspective on Hardware Security, Safety, and Trust 4.
Machine Learning Techniques for Detecting Hardware Trojans in ASIC designs
5. Next-Generation Semiconductor Reverse Engineering: Laser Delayering,
Correlative Imaging, and Cloud-Enabled Image Analysis Techniques 6.
Synthesis of Polymorphic Circuits for Hardware Security 7. Design
Obfuscation and Performance Locking Solutions for Mixed-Signal, Analog and
RF ICs 8. On-Chip Integrity, Reliability, and Aging Assurance Techniques
for ICs 9. Deep Learning Side-Channel Attack: Challenges and Opportunities
10. Side Channel Attack Avoidance and Mitigation through Asynchronous
Digital Design 11. Is ARM TrustZone trustable for confidentiality
protection? 12. Security Verification for Next Generation SoCs 13. Cloud
FPGA Accelerator Fingerprinting Using Communication Side-Channels 14.
Enterprise Risk Management of Electronics and Computing Device Supply
Chains
1. Introduction 2. Hardware Security In The Consumer Technology Industry 3.
A Commercial EDA Perspective on Hardware Security, Safety, and Trust 4.
Machine Learning Techniques for Detecting Hardware Trojans in ASIC designs
5. Next-Generation Semiconductor Reverse Engineering: Laser Delayering,
Correlative Imaging, and Cloud-Enabled Image Analysis Techniques 6.
Synthesis of Polymorphic Circuits for Hardware Security 7. Design
Obfuscation and Performance Locking Solutions for Mixed-Signal, Analog and
RF ICs 8. On-Chip Integrity, Reliability, and Aging Assurance Techniques
for ICs 9. Deep Learning Side-Channel Attack: Challenges and Opportunities
10. Side Channel Attack Avoidance and Mitigation through Asynchronous
Digital Design 11. Is ARM TrustZone trustable for confidentiality
protection? 12. Security Verification for Next Generation SoCs 13. Cloud
FPGA Accelerator Fingerprinting Using Communication Side-Channels 14.
Enterprise Risk Management of Electronics and Computing Device Supply
Chains
A Commercial EDA Perspective on Hardware Security, Safety, and Trust 4.
Machine Learning Techniques for Detecting Hardware Trojans in ASIC designs
5. Next-Generation Semiconductor Reverse Engineering: Laser Delayering,
Correlative Imaging, and Cloud-Enabled Image Analysis Techniques 6.
Synthesis of Polymorphic Circuits for Hardware Security 7. Design
Obfuscation and Performance Locking Solutions for Mixed-Signal, Analog and
RF ICs 8. On-Chip Integrity, Reliability, and Aging Assurance Techniques
for ICs 9. Deep Learning Side-Channel Attack: Challenges and Opportunities
10. Side Channel Attack Avoidance and Mitigation through Asynchronous
Digital Design 11. Is ARM TrustZone trustable for confidentiality
protection? 12. Security Verification for Next Generation SoCs 13. Cloud
FPGA Accelerator Fingerprinting Using Communication Side-Channels 14.
Enterprise Risk Management of Electronics and Computing Device Supply
Chains







